Comment on Bonfire & Guix, a love story -- fishinthecalculator
jim3692@discuss.online 1 week ago
I quickly went through the article, and I have a question: Why not Docker (or Podman) on NixOS?
NixOS has much larger community (although a bit toxic) and provides native tooling for managing OCI containers through Docker and Podman.
fishinthecalculator@lemmy.ml 1 week ago
I find Guix far better on almost every remark, in no particular order:
jim3692@discuss.online 1 week ago
I don’t have any experience with guix, so I will not express any opinions towards that.
However, regarding NixOS:
fishinthecalculator@lemmy.ml 1 week ago
My point on binaries was not really about reproducibility as nowadays most distro have reproducible builds: Arch, Debian, RHEL, SUSE and probably more. My point is that packages in Guix are bootstrapped from a very small binary seed, something like 357 bytes, which highly mitigates the risk of Trusting Trust attacks
jim3692@discuss.online 1 week ago
It’s the first time I see the concept of bootstrappability in the context of security.
Is it really worth the effort?
There are multiple ways to run a supply chain attack. With bootstrappability, one can be sure that the compiler is trusted, but what about the code that the compiler compiles? There was this recent attack to XZ utils, which shows that more attention is needed on the code being merged and compiled.
I think that this just creates a false sense of security.
Contrary to that, I had read about a BSD team (I think FreeBSD) that reviews all the code before each release. This way they have achieved ~5 RCE exploits throughout their entire history.